Network|engineers|are tasked with deploying, operating, and monitoring the network as efficiently, securely, and reliably as possible. As the complexity, scale, and security demands of the network increase, there is greater pressu...
Do you dread interactions with customer service? Are you tired of identifying yourself, your problem and all your interactions with the product or services to multiple agents? Do you wish call centers were more respectful of your ...
I have a great job. As a Global Threat Analyst, I provide intelligence analysis to senior executives and security teams at Cisco. I focus on the confluence of global political trends and advanced persistent cyber threats. People f...
Developers are always looking to embrace new technologies that can help them build the applications that drive innovation forward. This was evident at the Google Cloud Next '18 conference, where more than 25,000 registrants came t...
"Everybody has a vision for the future of manufacturing -Industry 4.0 and more. But what always seems to be left out is how to get there. We know where we are -we might know our security status as well -but the question remains....
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week - covering the dates between July 20 and 27. As with previous roundups, this post isn't meant to be an in-depth ana...
I am not a big moviegoer, but one of fun parts of going to the movies for most people is seeing the previews of coming attractions. Everyone wants to see the exciting new movie trailers to help decide if they want to go. I also re...
The European situationas shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in 8 European countries, reveals that the average percentage of alerts that are inv...
In a previous post we demonstrated how to automate the setup of a Continuous Integration / Continuous Deployment environment. Now we will demonstrate how to use it: a developer can create an application that will be compiled, then...
The University of British Columbia (UBC) wanted to reduce their greenhouse gas emissions by 67% from its 2007 levels over the next five years. For any organization pursuing sustainability, building management is a top priority. Bu...
The Challenge of implementing SPF and DKIM It's no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must ...
When I think of the contact centers I visited in the 1990s, I remember walking into an open area where the agents worked. I noticed all the brightly colored sticky notes that dotted their workspaces. At the time, I thought it look...